Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

of Netskope, Inc. All other trademarks are trademarks of their respective owners. 06/18 DS-10-8
REAL-TIME AND API PROTECTION
Options More than 3,000 pre-defined data identifiers
Fingerprinting and Exact Match capabilities*
Perform secondary DLP analysis for content 
leveraging on-premises DLP solution 
Custom profiles & regular expressions
Rules support global identifiers and severity levels
Multi-data identifier classification with Boolean 
operations
Pattern & keyword matching
Hundreds of industry standard DLP categories
Further increase coverage with OCR to extend DLP 
policies to images*
File Types Inspection for more than 1,000 file types
Supported Regulations Leverage dozens of pre-defined policy templates to identify sensitive data in accordance with regulations. 
Templates include (but are not limited to): AMRA, EC Directive, EU-GDPR, GLBA, HIPAA, PCI-DSS, PHI, PII, 
PHIPA,PIPEDA, SSN Confidentiality Act, US FTC Rules, etc.
Non-regulated Data Types Intellectual property data
Financial and legal terms
National ID numbers
International Bank Account Numbers (IBAN)
CONTEXT AWARE
Policy Is Enforced On Users, user groups, organization unit, custom user 
list
Applications, application instances, application 
categories 
File sharing options 
File types and size 
Activity types: Upload, download, view, post, send 
and share 
Device types: Desktop or mobile 
Device classification: Managed and unmanaged 
devices 
Location types: On-premises and remote 
Geo location: Source and destination 
Operating system and browser
Sync client
INCIDENT MANAGEMENT AND REMEDIATION
Complete Context and 
Visibility of the Violation
Forensic information of excerpts of the violation
Get granular alerts of violations in SkopeIT 
DLP and Compliance based reports
Incident Workflow Assign incidents to investigate override severity 
Customizable status for workflows
Remediation Workflow Contact the owner
Quarantine and restore
Restrict file permissions
Automatic Policy Actions Alert, Block, Encrypt 
User Notification and Coaching (redirect to custom notice) 
Quarantine and Legal Hold
Netskope DLP Features
Netskope DLP is sold as a separate SKU and requires the purchase of the Netskope Security Cloud or at least one of 
Netskope’s API Protection SKUs (e.g., Netskope for Office 365). Netskope DLP is available in standard and advanced options. 
Features marked with an * are not available in standard.
DATA VISIBILITY
Whether it’s to satisfy auditing requirements, compliance, or just corporate security policies, it’s important to understand where your 
most sensitive data is flowing and how it’s being used. Netskope gives you a comprehensive understanding of not only all cloud 
activity, regardless of device, network, or location, but also allows you to identify all sensitive data flowing in the cloud and detect 
DLP violations with an all-mode architecture capable of covering all cloud traffic whether users are on premises or remote or on a web 
browser, mobile app, or sync client. This includes discovering sensitive data at rest in sanctioned services and en route to and from 
all services, sanctioned or unsanctioned.of Netskope, Inc. All other trademarks are trademarks of their respective owners. 06/18 DS-10-8
REAL-TIME AND API PROTECTION
Options More than 3,000 pre-defined data identifiers
Fingerprinting and Exact Match capabilities*
Perform secondary DLP analysis for content 
leveraging on-premises DLP solution 
Custom profiles & regular expressions
Rules support global identifiers and severity levels
Multi-data identifier classification with Boolean 
operations
Pattern & keyword matching
Hundreds of industry standard DLP categories
Further increase coverage with OCR to extend DLP 
policies to images*
File Types Inspection for more than 1,000 file types
Supported Regulations Leverage dozens of pre-defined policy templates to identify sensitive data in accordance with regulations. 
Templates include (but are not limited to): AMRA, EC Directive, EU-GDPR, GLBA, HIPAA, PCI-DSS, PHI, PII, 
PHIPA,PIPEDA, SSN Confidentiality Act, US FTC Rules, etc.
Non-regulated Data Types Intellectual property data
Financial and legal terms
National ID numbers
International Bank Account Numbers (IBAN)
CONTEXT AWARE
Policy Is Enforced On Users, user groups, organization unit, custom user 
list
Applications, application instances, application 
categories 
File sharing options 
File types and size 
Activity types: Upload, download, view, post, send 
and share 
Device types: Desktop or mobile 
Device classification: Managed and unmanaged 
devices 
Location types: On-premises and remote 
Geo location: Source and destination 
Operating system and browser
Sync client
INCIDENT MANAGEMENT AND REMEDIATION
Complete Context and 
Visibility of the Violation
Forensic information of excerpts of the violation
Get granular alerts of violations in SkopeIT 
DLP and Compliance based reports
Incident Workflow Assign incidents to investigate override severity 
Customizable status for workflows
Remediation Workflow Contact the owner
Quarantine and restore
Restrict file permissions
Automatic Policy Actions Alert, Block, Encrypt 
User Notification and Coaching (redirect to custom notice) 
Quarantine and Legal Hold
Netskope DLP Features
Netskope DLP is sold as a separate SKU and requires the purchase of the Netskope Security Cloud or at least one of 
Netskope’s API Protection SKUs (e.g., Netskope for Office 365). Netskope DLP is available in standard and advanced options. 
Features marked with an * are not available in standard.
DATA VISIBILITY
Whether it’s to satisfy auditing requirements, compliance, or just corporate security policies, it’s important to understand where your 
most sensitive data is flowing and how it’s being used. Netskope gives you a comprehensive understanding of not only all cloud 
activity, regardless of device, network, or location, but also allows you to identify all sensitive data flowing in the cloud and detect 
DLP violations with an all-mode architecture capable of covering all cloud traffic whether users are on premises or remote or on a web 
browser, mobile app, or sync client. This includes discovering sensitive data at rest in sanctioned services and en route to and from 
all services, sanctioned or unsanctioned.